scispace - formally typeset
Open AccessJournal ArticleDOI

A Comprehensive Review on Malware Detection Approaches

Omer Aslan, +1 more
- 03 Jan 2020 - 
- Vol. 8, pp 6249-6271
Reads0
Chats0
TLDR
This paper presents a detailed review on malware detection approaches and recent detection methods which use these approaches, and the pros and cons of each detection approach, and methods that are used in these approaches.
Abstract
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from the malware, the malware needs to be detected before it affects a large number of systems. Recently, there have been made several studies on malware detection approaches. However, the detection of malware still remains problematic. Signature-based and heuristic-based detection approaches are fast and efficient to detect known malware, but especially signature-based detection approach has failed to detect unknown malware. On the other hand, behavior-based, model checking-based, and cloud-based approaches perform well for unknown and complicated malware; and deep learning-based, mobile devices-based, and IoT-based approaches also emerge to detect some portion of known and unknown malware. However, no approach can detect all malware in the wild. This shows that to build an effective method to detect malware is a very challenging task, and there is a huge gap for new studies and methods. This paper presents a detailed review on malware detection approaches and recent detection methods which use these approaches. Paper goal is to help researchers to have a general idea of the malware detection approaches, pros and cons of each detection approach, and methods that are used in these approaches.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey on Malware Detection with Graph Representation Learning

TL;DR: In this article , the authors provide an in-depth literature review to summarize and unify existing works under the common approaches and architectures, and demonstrate that Graph Neural Networks (GNNs) reach competitive results in learning robust embeddings from malware represented as expressive graph structures, leading to an efficient detection by downstream classifiers.
Proceedings ArticleDOI

Using Dtrace for Machine Learning Solutions in Malware Detection

TL;DR: This work uses Dtrace, a dynamic tracing framework recently introduced in Windows, to collect system call information from an affected system and builds a decision tree classifier that can detect malware using the sequences of system-calls made by malicious processes.
Journal ArticleDOI

MADS Based on DL Techniques on the Internet of Things (IoT): Survey

Hussah Talal, +1 more
- 24 Oct 2021 - 
TL;DR: In this paper, the authors presented a comprehensive study on security solutions in IoT applications, Intrusion Detection Systems (IDS), Malware Detection System (MDS), and the role of artificial intelligent (AI) in improving security in IoT.
Journal ArticleDOI

Self-Attentive Models for Real-Time Malware Classification

- 01 Jan 2022 - 
TL;DR: In this paper , two self-attention transformer-based classifiers, SeqConvAttn and ImgConvattn, are introduced to improve the performance of real-time malware classification.
Proceedings ArticleDOI

Using Side Channel Information and Artificial Intelligence for Malware Detection

TL;DR: In this article, side channel information leaked from hardware has been shown to reveal secret information in systems such as encryption keys, which can be used to detect malware running on a computing platform without access to the code involved.
References
More filters
Book

Learning Deep Architectures for AI

TL;DR: The motivations and principles regarding learning algorithms for deep architectures, in particular those exploiting as building blocks unsupervised learning of single-layer modelssuch as Restricted Boltzmann Machines, used to construct deeper models such as Deep Belief Networks are discussed.
Proceedings ArticleDOI

A detailed analysis of the KDD CUP 99 data set

TL;DR: A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.
Proceedings ArticleDOI

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.

TL;DR: DREBIN is proposed, a lightweight method for detection of Android malware that enables identifying malicious applications directly on the smartphone and outperforms several related approaches and detects 94% of the malware with few false alarms.
Proceedings ArticleDOI

Data mining methods for detection of new malicious executables

TL;DR: This work presents a data mining framework that detects new, previously unseen malicious executables accurately and automatically and more than doubles the current detection rates for new malicious executable.
Proceedings ArticleDOI

Crowdroid: behavior-based malware detection system for Android

TL;DR: The method is shown to be an effective means of isolating the malware and alerting the users of a downloaded malware, showing the potential for avoiding the spreading of a detected malware to a larger community.
Related Papers (5)
Trending Questions (1)
How do I scan a pixel for malware?

This shows that to build an effective method to detect malware is a very challenging task, and there is a huge gap for new studies and methods.